<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>
Grass carp at a weight of 34.68 + 2 g were gradually exposed to four saline concentrations: tap water (0.1), 3, 6, 9, and 12 gm/litter, and the first concentration represented a control treatment. Fish were fed on a diet with a protein content of 30% for ten weeks. Results of the growth experiment showed that the feed conversion rate was 2.46, 3.58, 4.84, 6.77, and -8.56 in the first to fifth treatments, respectively, and the rate feed conversion efficiency was 40.65, 27. 93, 20.66, 14.77 and 11.68 %, while the protein intake was 22.38, 20.44, 18.86, 17.47 and 16.56 g in salt concentrations of 0.1, 3, 6, 9 and 12 g/L, respectively. In another experiment to study the effect of salt acc
The transition states that Iraq economy lived it after 2003, and the change in tools used by monetary policy based on C.B.I law 56 in 2004, under the especially situation for the economy (structural imbalances and the weakness of banking & financial sector).
The monetary policy adopted the inflation targeting policy to mantain the monetary stability in the economy and considered it an incubator for future growth. It used the exchange rate as a nominal anchor to achieve the goal (because the rentier of economy, finance Shallowness & separation between real sector and finance sector, all this cause the normal channel to transfer the effect of monetary policy (interest rate) ineffective.
... Show MoreThe study aimed to show the jurisprudential impact of the multiplicity of directing the syntactic movement of the Qur’anic readings, and it was based on the inductive, descriptive and analytical approach. , such as the difference in explaining the ruling on washing the feet, and the one who meditates on the Qur’anic readings notices in it a picture of the Qur’anic miracles, and this is what is manifested by the brevity of the speech. Collapse the research, and the research tried to trace the Qur’anic readings, contained in the verses, and the readings were limited to what is related to the explanatory meaning mentioned by the commentators, by clarifying the explanatory relationship between the Qur’anic readings and the me
... Show MoreAbstract The study aims to clarify the value of auditing economic units and how it can be measured, which is one of the most important challenges to matching the Value Relevance of Accounting Information. The problem of the study was identified with questions that revolve around the extent to which it is possible to measure the value of auditing in Iraqi economic units and the extent to which the value of auditing affects the adequacy of accounting information. Through reviewing the studies discussing this topic, it was found that auditing can provide value through the performance of the auditor and adding value to the economic unit subject to audit. The study recommended the need to study the situational factors of auditing, whether exter
... Show MoreThe purified frog skin peptides were tested on leukemic patients lymphocytes, which revealed effects of cytotoxicity. Four frogs (Rana ridibunda) were stimulated by single intra-peritoneal injection of norepinephrine-HCl . Five different peptides;1(18) A, 2(19) L, 3(20) I,4(21) E and 5(22) Y were isolated and quantified. The peptide 3(20)I had 5.87% of hemolysis, while healthy human lymphocytes cytotoxic activity was for 2(19)L with inhibition( -10.4%).All peptides were subjected to polyacrylamide gel electrophoresis. The results revealed peptides 1(18)A, 2(19)L, 3(20)I which appeared as low as 10 KDa marker. Theoretically, the whole polypeptide had a molecular weight 7488.61 Dalt
... Show MoreThe paper aims to measure and analysis the impact Public Spending on Iraq economy (Kaldor Variables).
(variables of the magic square Kaldor) and them in after 2003.
The paper adopted econometric Methods to test the stationarity of the Variables under consideration. For the period (2005-2016) by using multiple regression and estimation the Impulse response function (IRF), by adopting Eviews 10 program.
The results of Impulse response function for the following five-years after the period under consideration reflexes that public expenditure (PEX) was fluctuating between positive and negative in all the variables of the research and this shows the fragility of the performance of fiscal policy in Iraq.
T
... Show MoreAbstract : Tin oxide SnO2 films were prepared by atmospheric chemical vapor deposition (APCVD) technique. Our study focus on prepare SnO2 films by using capillary tube as deposition nozzle and the effect of these tubes on the structural properties and optical properties of the prepared samples. X-ray diffraction (XRD) was employed to find the crystallite size. (XRD) studies show that the structure of a thin films changes from polycrystalline to amorphous by increasing the number of capillary tubes used in sample preparation. Maximum transmission can be measured is (95%) at three capillary tube. (AFM) where use to analyze the morphology of the tin oxides surface. Roughness and average grain size for different number of capillary tubes have b
... Show MoreAdenosine deaminase (ADA; Ec: 3.5.4.4), 5´- Nucleotidase (5´– NT; Ec: 3.1.3.5), and AMP – amino hydrolase (AMP – deaminase AMPDA; Ec: 3.5.4.6) activities were measured in sera of ovarian cancer patients before surgery, and after chemotherapy. The results indicated that ADA specific activity increased significantly (P<0.05), while 5´-NT and AMPDA specific activity decreased significantly (P<0.05) in ovarian cancer patients before surgery in comparison with those of their corresponding control women and benign tumors groups. When the activities of these enzymes were measured after chemotherapy, a significant decrease (P<0.05) in ADA activity, and a significant increase (P<0.05) in 5´- NT and AMPDA activities w
... Show MoreThe effect of adding different volume of coumarin dye (5, 15, 25 and 35) ml on optical properties of Poly (Methyl Meth Acrylate) was studied. Films of pure PMMA and PMMA with different volume of coumarin dye (5, 15, 25 and 35) ml were prepared using the casting technique. Transmission and absorption of the films were measured by using UV-VIS spectrometer technique type (100 Conc), in order to assess the type of transmission which was found an indirect transition. An optical energy gap of pure PMMA is (4.95e v) and after adding coumarin with volume (25, 35) ml, the energy gap for PMMA decrease by (0.05) compere to pure PMMA films and addition energy gap appear equal to (4.1 e v). It was found that the absorption coefficient, extinction coeff
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show More